In part 5 we'll continue showing you how to implement each of the identity models and providing some tips for best practices that will ensure your users have the greatest protections possible for their Office 365 connections with whichever identity model you ultimately choose.
This video demonstrates viewing managed service accounts and hosts using a free tool.
Here in Part 4, we turn our focus to the very important topic of identity management in the cloud and particularly how identity management works in Office 365.
Sophos UTM software appliance was selected the winner in the Firewall Solution category of the WindowSecurity.com Readers' Choice Awards. Check Point UTM-1 and FortiGate 1000 Series were runner-up and second runner-up respectively.
Event Log Consolidator allows you to view, consolidate, and dismiss event logs and correlate issues among multiple Windows systems quickly and easily from one central location.